With the increased frequency and sophistication of cyber attacks and the implementation of stricter regulations around data privacy and protection – it’s imperative that businesses keep abreast of information security challenges.
While new technologies, such as IoT are increasingly vulnerable to attack, others such as Artificial Intelligence (AI) and machine learning are being used to combat cyber-crime.
Read on to learn more about the risks introduced by IoT, and how AI and machine learning are assisting businesses to automate cyber security processes in order to more effectively detect and respond to cyber threats…
Cyber risk in an Internet of Things world
As part of a series published by Deloitte which covers emerging trends in technology, media and telecommunication, this particular article issue looks at the wide range of risks associated with IoT implementations. It provides a snapshot of the threat landscape and highlights new developments in combating the risks introduced by even more connected devices, more data and more points of vulnerability.
- Publisher: Deloitte
- Access: Public
- Download: None
How AI can help you stay ahead of cybersecurity threats
Large organizations are turning to AI and machine learning to automate security processes and detect threats more effectively. Read on to discover how Barclays Africa and other organizations are utilizing advanced technologies to stay ahead of cyber threats by tackling massive amounts of data and compensating for scarce critical (human) skills.
- Publisher: CSO Online (from IDG)
- Access: Public for part of the article. Registration required to continue reading
- Download: None
The truth about Machine Learning in cybersecurity: Defense
This article looks at the role that machine learning (ML) can play in fighting cyber threats. While not effective in certain areas, such as image recognition and language processing, machine learning is boosting cyber security efforts through common methods such as regression (prediction), classification, clusterization, recommendation and reinforcement.
- Publisher: Forbes
- Access: Public
- Download: None